Adv Eth
Adv Eth
in
Ethernet
Yaakov (J) Stein
June 2010
Chief Scientist
RAD Data Communications
Outline
Modern Ethernet
VLANs and their uses
Ethernet services
Additional bridging functions
p
QoS Aspects
Link aggregation
Ethernet protection mechanisms
EFM
RPR
Ethernet OAM
Ethernet security
S
Synchronous
h
Ethernet
Eth
t
AdvEth
Slide 2
Modern Ethernet
Carrier grade Ethernet
IEEE 802 view
ITU-T view
e
MEF view
IETF view
AdvEth
Slide 3
full duplex
p
10G p
point-to-point
p
optical
p
links
Ethernet in the first mile DSL access
passive optical GEPON networks
metro Ethernet networks
wireless Ethernet 10M hot spots
etc.
AdvEth
Slide 4
Carrier
Carrier grade
grade Ethernet
AdvEth
Slide 5
4 views
IEEE 802 LAN/MAN standards committee (since 1980)
Ethernet is a set of LAN/MAN standards
ITU-T
Slide 6
IEEE 802
802,, misc WGs, documents
802 LAN/MAN Standards Committee
802-2001
802.1D-2004
802.1Q-2005
802 1 d
802.1ad
802.1ah
802.2 LLC
802.3 Ethernet WG
802.3-2005
802.3z
GbE
802.3ad
link aggregation
802.3ah
EFM
802.3as
2000 byte frames
Note:
working groups and study groups
(e.g 802.1, 802.3) are semi-permanent
p j
projects
and task forces
(e.g. 802.3z, EFM) are temporary
project outputs are usually
absorbed into main WG document
802.11-2005
802.11a
802.11b
802.11g
g
802.17 RPR WG
AdvEth
Slide 7
802..3
802
actually, IEEE only calls 802.3 Ethernet
802.3 is a large standard, defining
repeaters
rate autonegotiation
li k aggregation
link
ti (we
(
will
ill di
discuss llater)
t )
802.3aq 10GBASE-LRM
802.3ar congestion management
802 3as frame expansion
802.3as
AdvEth
Slide 8
SA (6B)
T/L (2B)
data (0-1500B)
pad (0-46)
FCS (4B)
68 1522 B
DA(6B)
SA(6B)
VT(2B)
VLAN(2B)
T/L(2B)
data (0-1500B)
pad(0-46)
FCS(4B)
8100
Slide 9
Ethernet Addressing
th mostt important
the
i
t t partt off any protocols
t
l overhead
h d are the
th address
dd
fields
fi ld
Ethernet has both source (SA) and destination (DA) fields
the addresses need to be unique to the network
the fields are 6-bytes
6 bytes in length in EUI
EUI-48
48 format
(once called MAC-48, EUI = Extended Unique Identifier)
248 = 281,474,976,710,656
281 474 976 710 656 possible addresses
addresses can be universally administered (burned in)
or locally administered (SW assigned)
AdvEth
Slide 10
Slide 11
EUI format
OUI1 OUI2 OUI3 EXT1 EXT2 EXT3
X X X X X X U M
OUI 00
00-20-D2
20 D2
is assigned to RAD
Slide 12
Ethernet clients
the 2-byte Ethertype identifies the client type
assigned by IEEE Registration Authority
all Ethertypes are greater than 0600 (1536 decimal)
some useful Ethertypes :
0800 IPv4
0806 ARP
22F3 TRILL
22F4 IS-IS
8100 VLAN tag
8138 Novell IPX
814C SNMP over Ethernet
86DD IPv6
8809 slow protocols
8847 MPLS unicast
8848 MPLS multicast
88D8 CESoETH
88A8 Q-in-Q SVID / MAC-in-MAC BVID
88F5 MVRP
88F6 MMRP
88F7 IEEE 1588v2
8902 CFM OAM
Slide 13
DA SA 8809 subtype
Subtype:
3 is EFM OAM
AdvEth
Slide 14
LLC
There are other ways to differentiate clients (other than by Ethertype)
802.2
802 2 (Logical Link Control)
first three bytes of payload :
Destination Service Access Point (1B)
Source
S
S i Access
Service
A
P i t (1B)
Point
Control Field (1 or 2 B)
DA SA len LLC
Example SAPs
04
IBM SNA
06
IP
80
3Com
AA
SNAP
BC
Banyan
E0
Novel IPX/SPX
F4
FE CLNS
payload
AdvEth
Slide 15
SNAP
DA SA len LLC SNAP
payload
Slide 16
Parsing
if EtherType/Length > 1500 then EtherType
else if payload starts with FF-FF then Netware
else if payload starts with AA then SNAP
else
e
se LLC
C
DA SA len/Ethertype XX
payload
AdvEth
Slide 17
L2 control protocols
The IEEE (and others) have defined various control protocols (L2CPs)
Here are a few well-known
well known L2CPs :
protocol
DA
reference
01-80-C2-00-00-00
01
80 C2 00 00 00
802.2 LLC
01-80-C2-00-00-01
802.1D
802
1D 8,9
8 9
802.1D17 802.1Q 13
802.3 31B 802.3x
802.3 43 (ex 802.3ad)
Port Authentication
01-80-C2-00-00-02
Eth T
EtherType
88 09
88-09
Subtype 01 and 02
01-80-C2-00-00-02
EtherType 88-09
yp 03
Subtype
01-80-C2-00-00-03
802.1X
E-LMI
01-80-C2-00-00-07
MEF-16
Provider MSTP
01-80-C2-00-00-08
802.1D 802.1ad
Provider MMRP
01-80-C2-00-00-0D
802.1ak
STP/RSTP/MSTP
PAUSE
LACP/LAMP
Link OAM
LLDP
GARP (GMRP, GVRP)
01-80-C2-00-00-0E
802.1AB-2009
EtherType 88-CC
Block 01-80-C2-00-00-20 802.1D 10, 11, 12
through 01-80-C2-00-00-2F
Note: we wont discuss autonegotiation as it is a physical layer protocol (uses link pulses)
AdvEth
Slide 18
10BASE2
10 Mb/s thin coax (RG58) 185m CSMA/CD
10BASE5
10 Mb/s thick coax (RG11) 500m CSMA/CD
10BROAD36
10 Mb/s PSK CATV 2.8-3.6km CSMA/CD
AdvEth
Slide 19
100BASE-TX
fast Ethernet, 100Mb/s, 4B5B encoding, 2 pair CAT5, FD
1000BASE-T
(ex 802.3ab, now 802.3 clause 40)
GbE 4D-TCM-PAM5/EC,
GbE,
4D TCM PAM5/EC 100m,
100m 4 pairs CAT5/5e/6
CAT5/5e/6, FD
10PASS-TS
( EFM,
(ex
EFM now 802.3
802 3 clause
l
62) 10Mb/s,
62),
10Mb/ 750m
750 DMT VDSL
2BASE-TL
(ex EFM, now 802.3 clause 63), 2Mb/s, 2.7km, SHDSL
AdvEth
Slide 20
10BASE-FL
p
with FOIRL
10 Mb/s,, P2P,, CSMA/CD / FD,, 2km,, backward-compatible
100BASE-FX
100 Mb/s,
Mb/s multimode fiber,
fiber 4B5B,
4B5B 400m HD / 2km FD
1000BASE-LX
l
long
(1270-1355
(1270 1355 nm),
) 8B10B,
8B10B >2km
2k (single-mode),
( i l
d ) FD only
l
1000BASE-SX
short- (850nm near IR), 8B10B, 220m (multi-mode), FD only
10GBASE-SR/LR/ER/LX4
ex 802.3ae, short-range, long-range, extended range, WDM
AdvEth
Slide 21
802..1D
802
802.1 discusses MAC bridges
802 1D iis also
802.1D
l a large standard,
t d d d
defining
fi i
802.1ad Q-in-Q
802 1af MAC key security
802.1af
802.1ag OAM
802.1ah MAC-in-MAC
802.1aj 2-port MAC relay
802.1au congestion notification
AdvEth
Slide 22
LLC
LLC
MAC entity
frames
info
MAC entity
media
dependent
functions
media
dependent
functions
port 1
port 2
N
Note:
a bridge
b id must have
h
at least
l
2 ports
here we depict exactly 2 ports
AdvEth
Slide 23
LLC
LLC
MAC entity
MAC entity
receive
frame
transmit
frame
port 1
port 2
N
Note:
relay
l entity
i passes frame
f
to port 2
dependent on port state and filtering database
AdvEth
Slide 24
LLC
LLC
port
state
learning
MAC entity
MAC entity
filtering DB
receive
frame
transmit
frame
port 1
port 2
N
Note:
we do
d not show
h forwarding
f
di off packet
k that
h may occur
AdvEth
Slide 25
LLC
port
state
port
state
filtering DB
RCV
XMT
port 1
XMT
RCV
port 2
N
Note:
PDUs are sent and
PDU
d received
i d bby the
h bbridge
id protocoll entity
i
bridge protocol entity updates filtering DB and port states
AdvEth
Slide 26
Translation to G.805
G.805
we can redraw the baggy pants model per G.805
(from G.8010 Appendix II)
ETH/BP
ETH/BP
ETH
ETH
ETH
ETY/ETH
ETY/ETH
ETY
ETY
AdvEth
Slide 27
Extension to N ports
higher layer entities
i the
in
th b
baggy pants
t di
diagram
port 1 and port 2 are identical
MAC entity
media
dependent
functions
port 1
MAC
entity
MAC
entity
port 1
port 2
MAC
entity
port N
AdvEth
Slide 28
ITU--T view
ITU
the name Ethernet disguises many different layer networks
ETH (MAC layer) is a packet/frame CO/CL network
there is also a VLAN variant called ETH-m
ETH can run over various server layers, including ETY
ETY (PHY layer) has a number of options
ETYn n = 1, 2.1, 2.2, 3.1, 3.2, 3.3, 4
ETY1 :
ETY2.1:
ETY2.2:
ETY3.1:
ETY3.2:
ETY3.3:
ETY4 :
AdvEth
Slide 29
ITU--T Recommendations
ITU
G.8001 EoT definitions
G 8010 Ethernet layer network architecture
G.8010
G.8011 Ethernet over Transport services framework
G 8011 1 Ethernet private line service
G.8011.1
G.8011.2 Ethernet virtual private line service
G.8012 Ethernet UNI and NNI
G.8021 Ethernet transport equipment characteristics
G.8031 Ethernet linear protection switching
G.8032 Ethernet ring protection switching
Y.1730 Ethernet OAM - requirements
Y.1731 Ethernet OAM
AdvEth
Slide 30
Ethernet servers
coaxial cable
optical fibers
AdvEth
Slide 31
PoS (PPP/HDLC)
LAPS
GFP
PPP/HDLC
GFP
over OTN
GFP
AdvEth
Slide 32
AdvEth
Slide 33
Slide 34
ETH adaptations
ETH_TFP
ETH_FP
SRV/ETH
SRV_AP
ETH_TFP
ETH_FP s
SRV/ETH-m
SRV_AP
the adaptation from ETH to the server layer (e.g. ETY) has
1 ETH Termination Flow Point responsible for DA, SA, P bits, OAM
1 SRV Access Point ((SRV can be ETY,, but can be other server networks))
AdvEth
Slide 35
Traffic conditioning
ETH_FP
t ffi conditioning
traffic
diti i function:
f
ti
inputs CI
classifies
l
ifi ttraffic
ffi units
it according
di tto configured
fi
d rules
l
polices
li
non-conformant
f
t traffic
t ffi units
it
ETH
ETH_FP
AdvEth
Slide 36
MEF view
MEF focuses on Ethernet as a service to a customer
the service is provided by a Metro Ethernet Network (any technology / architecture)
the service is seen by the Customer Edge
the UNI is the demarcation point between customer and MEN
each UNI serves a single customer, presents a standard Ethernet interface
at the UNI CE and MEN exchanged service (MAC) frames
connection between UNIs called an Ethernet Virtual Connection
UNI
UNI
CE
CE
MEN
ingress
egress
AdvEth
Slide 37
Slide 38
CE
UNI-C
UNI
I-NNI
UNI-N
E-NNI
MEN-y
MEN
MEN-x
AdvEth
Slide 39
EVCs
a public MEN can not behave like a shared LAN
since ingress frames must not be delivered to incorrect customers
an association of 2 or more UNIs is called an EVC
ingress frames must be delivered only to UNI(s) in the same EVC
when several UNIs frames may be flooded to all or selectively forwarded
frames with FCS errors must be dropped in the MEN (to avoid incorrect delivery)
a single UNI may belong to several EVCs (differentiated by port and/or VLAN ID)
EVC 2
EVC 1
HQ
EVCs 1, 2, 3
MEN
EVC 3
AdvEth
Slide 40
EVC types
a point-to-point EVC associates exactly 2 UNIs
UNI
MEN
UNI
a multipoint-to-multipoint
p
p
EVC connects 2 or more UNIs
Note: MP2MP w/ 2 UNIs is different from P2P (new UNIs can be added)
unicast frames may flooded or selectively forwarded
broadcast/multicast frames are replicated and sent to all UNIs in the EVC
MEN
UNI
UNI
AdvEth
Slide 41
Metro Carrier
ENNI-N
UNI-N
UNI
Subscriber
A
so MEN CEN
CEN 1
ENNI-N
ENNI
UNI-N
CEN 2
UNI-C
UNI
Subscriber
B
EVC
S EC
S-EC
S-ECSs
OVCs
SP-EC
O-ECSs
AdvEth
Slide 42
AdvEth
Slide 43
Proxy ARP
router responds to ARP request to capture frames
Inverse ARP
frame-relay station unicasts DLCI to find out remote IP address
ARP mediation
mediate over L2VPN between networks using different ARPs
(e.g.
(e
g Ethernet
e e o
on o
one
e sside
de a
and
d FR o
on the
eo
other)
e)
AdvEth
Slide 44
VLANs
VLANs
tagging (802
(802.1Q)
1Q)
SVL and IVL switches
stac g
VLAN stacking
PBN and PBBN
PBT
MPLS-TP
AdvEth
Slide 45
Virtual LANs
in standard practice each LAN needs its own infrastructure
1 broadcast domain per set of cables and hubs
all
ll stations
t ti
on LAN see allll traffic
t ffi
we may want a single physical infrastructure to support many LANs
simpler and less expensive than maintaining separate infrastructures
multiple low-speed LANs on one high-speed infrastructure
segment broadcast domains (lower BW/processing) without routers
security for different departments in company / groups in campus
separation may be based on switch ports or MAC address or VLAN ID (tag)
we will
ill nott d
delve
l d
deeply
l iinto
t VLAN
VLANs h
here (see
(
e.g. 802.1Q
Q Appendix D))
I assume that this is treated in elementary Ethernet course
port-based
VLAN
AdvEth
Slide 46
802.1p
p results were incorporated
p
into 802.1D-1998
priority
802.1Q intentionally left separate and NOT incorporated
y distinct from non-VLAN bridging
g g
considered sufficiently
in particular, baggy pants model enhanced
new protocol GVRP (see below)
VID VLAN
AdvEth
Slide 47
VLAN ID (VID)
2B VLAN tag
P-bits
bi (3b) CFI
C (1b)
VID(12b)
Slide 48
queuing
i ffor ttransmission
i i
AdvEth
Slide 49
Slide 50
Asymmetry case
1
3
2
Slide 51
Slide 52
VLAN stacking
we tag Ethernet frames by using Ethertype 8100
DA
SA
8100
VLAN 1
type
data
pad
FCS
SA
8100
VLAN 2
8100
VLAN 1
t
type
d t
data
pad
d
FCS
Warning:
W
i
although superficially Q-in-Q
looks like an MPLS stack,
th is
there
i no network
t
k layering
l
i here
h
the DA remains the same!
AdvEth
Slide 53
CE
PE
PBN
PE
CE
802.1ad
approved Dec 2005
published May 2006
or
treat them as Customer VIDs, and push a Service VID (customer ID)
CE
CE
CVID=1100
CE
SVID=12
CVID=1100 PE
PE
CE
AdvEth
Slide 54
8100 (C-TAG)
D
E
I
S-VID
C
F
I
C-VID
AdvEth
Slide 55
AdvEth
Slide 56
Progress to MACMAC-in
in--MAC
802.1Q
802
1Q
DA SA
802.1ad
DA SA
88A8
802.1ah
B-DA B-SA
DA
SA
88A8
88A8
payload
FCS
VLAN
payload
FCS
8100
S-TAG
B-TAG
S TAG
S-TAG
802.1D
DA SA
8100
TBD
8100
C-TAG
FCS
I-TAG
C TAG
C-TAG
payload
payload
l d
FCS
AdvEth
Slide 57
PBBN 802
802..1ah
802.1ah
802
1ah
approved June 2008
CE
CE
CE
802.1ad interface
CE
802 1D or 802.1Q
802.1D
802 1Q interface
PBN
CE
PE
BE PBBN
B
CE
PE PBN
N
BE
CE
CE
B BE
802.1ah interface
PE
PBN
CE
CE
CE
4B I-TAG
ISID (24b)
AdvEth
Slide 58
PBT (PBB
(PBB--TE)
802..1Qay
802
BVID=1
pp
pure connection-oriented topology
p gy
we can thus set up
we can use management (OSS)
or control p
plane p
protocols ((e.g.
g RSVP-TE)) to p
populate
p
FID tables
(IETF GELS/CCAMP, ITU G.pbt)
BVID=2
AdvEth
Slide 59
MPLS llabel
b l
PW label
l b l CW DA SA 8100 C-TAG
C TAG T
payload
l d
FCS
AdvEth
Slide 60
AdvEth
Slide 61
More alternatives
there are other ways to
set up CO connections
avoid use of customer MAC addresses
MPLS-TP (Transport Profile)
add an MPLS label to the ETH overhead
in provider network switch solely based on label
similar to regular MPLS, but
performed by switch instead of LSR
various transport extensions such as linear/ring protection, OAM
TRILL (Transparent Interconnection of Lots of Links ) - see later on
invented by Radia Perlman (inventor of STP and IS
IS-IS)
IS)
uses IS-IS directly on MAC addresses (no need to configure IP addresses)
adds outer MAC header + shim header (with TTL)
is
i completely
l t l ""no-touch"
t
h" (plug-and-play).
( l
d l )
finds optimal paths
AdvEth
Slide 62
Ethernet services
AdvEth
Slide 63
Ethernet services
we previously defined
E-LINE
E LINE point
point-to-point
to point layer 2 service
E-LAN multipoint-to-multipoint Ethernet service
but MEF and ITU have gone a step further
MEF 6 splits E-LINE
E LINE into EPL and EVPL
ITU followed - Recommendations: G.8011.1 and G.8011.2
and E-LAN can be split
p into EPLAN and EVPLAN
these distinctions are made in order to live up to SLAs
i provide
i.e.
id d
defined
fi d service
i attributes
tt ib t
AdvEth
Slide 64
EVCs revisited
in our previous discussion of EVCs we didnt mention VLANs
we now realize
li customer
t
EVC
EVCs can b
be di
distinguished
ti
i h db
by VLAN ID
IDs
if the transport infrastructure is ETH, there may be an SVID
if the customer wants to have several EVCs, there will be a CVID
(here we simply mean the customers 802.1Q VLAN ID)
the provider may promise VLAN preservation
i.e. not change CVIDs (untagged remain untagged)
at the UNI-N there will be a CVID to EVC map (see MEF 10.1)
there can be three types of maps:
all to one
one to one (not MEF 10 term)
arbitrary (not MEF 10 term)
AdvEth
Slide 65
all to one
EVC 1
EVC 2
all CVIDs
150
150
arbitrary
1 .. 100
101 .. 200
Slide 66
each
h CVID mapped
d tto a diff
differentt EVC
untagged (and priority tagged) mapped to default EVC
support multiple EVCs from a single switch port
no VLAN preservation can makes customer configuration easier
similar to frame relay (DLCI identifies PVC)
CVID=1001
CVID=1
CVID=22
CVID
untagged
C
CVID 1
CVID=1
EVC 1
EVC 2
default EVC
SP
CVID=1002
CVID 1
CVID=1
CVID=1003
CVID
1003 CVID=1
C
AdvEth
Slide 67
CVID=1 100
CVID=101 200
untagged
EVC 1
EVC 2
default EVC
AdvEth
Slide 68
EPL
Ethernet Private Line is a dedicated-BW E-LINE (p2p) service
transport network seems to be a transparent cable
no frame loss unless FCS errors
CE
PE
S
SP
PE
CE
type 1 terminate ETY, transport MAC frame over server (SDH/GFP-F, MPLS)
t
type
2 transparent
t
t transport
t
t (e.g.
(
GFP-T)
GFP T)
native (special case for 10GBASE-W)
AdvEth
Slide 69
EVPL
Ethernet Virtual Private Line is a shared-BW E-LINE (p2p) service
statistical multiplexing of user traffic, marked by VLAN IDs
(actually, all resources are shared constraint may be switch fabric computation)
EPL
CE
PE
PE
CE
CE
CE ITU terms:
spatial
ti l vs. logical
l i l
traffic separation
EVPL
CE
CE
PE
PE
CE
CE
AdvEth
Slide 70
EPLAN
Ethernet Private LAN is a dedicated-BW E-LAN service
possible SP topologies
full mesh
t
star
main switch
CE
PE
PE
CE
PE
CE
PE
PE
CE
CE
PE
CE
PE
PE
CE
CE
PE
CE
AdvEth
Slide 71
EVPLAN
Ethernet Virtual Private LAN is a shared-BW E-LAN service
statmuxed BW and switch fabric are shared among customers
useful service, but most difficult to manage (not yet studied)
when server is MPLS, this is VPLS
best effort version is widely deployed
CE
CE
PE
PE
CE
PE
CE
CE
CE CE CE
AdvEth
Slide 72
GARP GVRP,
GARP,
GVRP GMRP (802.1ak)
(802 1ak)
rapid spanning tree (802.1w)
multiple
lti l spanning
i ttrees (802
(802.1s-2002)
1 2002)
Rbridges
AdvEth
Slide 73
GARP
Generic Attribute Registration Protocol
(802
802..1D clause 12
12))
(WARNING not Gratuitous ARP)
GARP PDU
AdvEth
Slide 74
GVRP
(802
802..1Q clause 11
11))
with static p
provisioning
g need to configure
g
every
y switch
AdvEth
Slide 75
GMRP
(802
802..1D clause 10
10))
GARP Multicast
M lti
t Registration
R i t ti Protocol
P t
l distributes
di t ib t multicast
lti
t group info
i f
frames with multicast address
need to be replicated and sent to all members of the multicast group
GMRP enables automatic registering and deregistering
FIDs ensure that multicast frames are only sent to bridges that need them
GMRP mustt fi
find
d a sub-tree
bt
off the
th spanning
i tree
t
AdvEth
Slide 76
RSTP (802
(802..1w)
Rapid Spanning Tree Protocol (AKA rapid reconfiguration)
RSTP configures the state of each switch port
in order to eliminate loops
STP may takes
t k minutes
i t to
t (re)converge
( )
goal of RSTP is 10 ms. convergence
802 1 incorporated
802.1w
i
t d into
i t
RSTP is an evolutionary update of STP
802.1D-2004 clause 17
new algorithm
same terminology
it supersedes
p
the pprevious
mostly
tl same parameters
t
STP and STA
backwards compatible with STP
but
additions to BPDU format (all 8 bits of flag byte used)
simplified port states
new variable holding the port role
AdvEth
Slide 77
802 1 has
802.1w
h only
l 3
discarding
learning
forwarding
Slide 78
AdvEth
Slide 79
Rbridges
optimized paths
but no configuration
g
no IP layer
AdvEth
Slide 80
Algorhyme
I think that I shall never see
a graph more lovely than a tree.
A tree whose crucial property
is loop
loop-free
free connectivity.
connectivity
A tree that must be sure to span
so p
packet can reach every
y LAN.
First, the root must be selected.
by ID, it is elected.
Least-cost paths from root are traced.
in the tree, these paths are placed.
A mesh is made by folks like me
me,
then bridges find a spanning tree.
R di P
Radia
Perlman
l
AdvEth
Slide 81
Algorhyme v2
v2
I hope that we shall one day see
a graph more lovely than a tree.
A graph to boost efficiency
while
hil still
till configuration-free.
fi
ti f
A network where RBridges can
route packets to their target LAN.
The paths they find, to our elation,
are least cost paths to destination.
With packet hop counts we now see,
the network need not be loop-free.
RBridges work transparently
transparently.
without a common spanning tree.
Ray Perlner
AdvEth
Slide 82
QoS Aspects
AdvEth
Slide 83
Flow control
When an Ethernet switch receives traffic faster than it can p
process it
it needs to tell its immediate neighbor(s) to slow down
O half-duplex
On
h lf d l lilinks
k th
the back
b k pressure can be
b employed
l
d
overloaded device jams the shared media by sending preambles or idle frames
detected by other devices as collisions causing senders to wait (CSMA/CD)
On full-duplex point-to-point links, PAUSE frames are sent
Since they are sent on a point
point-to-point
to point link
link, the DA is unimportant
unimportant,
and the standard multicast address 01-80-C2-00-00-01 is used
making the PAUSE frame easy to recognize
The PAUSE frame encodes the requested pause period
as a 2-byte unsigned integer representing units of 512 bit times
AdvEth
Slide 84
Handling QoS
outputt port 3
outputt port 2
outputt port 1
switch
fabric
switch
fabric
input porrt 2
input porrt 1
but then for the next switch to know the priority too
we would need to send to its appropriate port too
Slide 85
802..1p
802
the VLAN tag reserves a 3 bit user priority field AKA P-bits
P bits
P-bits allow marking individual frames with a value 0 7
non-VLAN
non
VLAN frames can use priority tagging (VLAN=0)
(VLAN 0)
just to have a user priority field
user priority levels map to traffic classes (CoS)
traffic class indicates drop probability, latency across the switch, etc.
but there are no BW/latency/jitter guarantees
P=0 means non-expedited traffic
802.1Q recommends mappings from P-bits to traffic class
see later
l t ffor RPR traffic
t ffi classes
l
and
d priority
i it
AdvEth
Slide 86
frame loss
fraction of frames that should be delivered that actually are delivered
specified by T (time interval) and L (loss objective)
frame delay
measured UNI-N to UNI-N on delivered frames
specified by T, P (percentage) and D (delay objective)
f
frame
delay
d l variation
i i
specified by T, P, L (difference in arrival times), V (FDV objective)
BW profiles
per EVC, per CoS, per UNI
specified by CIR, CBS, EIR, EBS,
AdvEth
Slide 87
E
AdvEth
Slide 88
Hierarchical BW profiles
MEF 10.1 allows bandwidth profile
p
per UNI ((can be different at different UNIs of same multipoint
p
EVC))
per EVC and CoS
but doesnt allow a single frame to be subject to more than 1 profile
New work
N
k iin th
the MEF iis aimed
i d att allowing
ll i
per CoS bandwidth profile, followed by
per EVC color-aware profile
Thus
frames will never be downgraded
(greenyellow or yellowred)
(greenyellow,
frames may be upgraded
(redyellow, yellowgreen)
shariing
The idea is to allow the user to use excess paid for bandwidth
for lower priority traffic (BW sharing)
coupling
Slide 89
Link aggregation
AdvEth
Slide 90
Slide 91
AdvEth
Slide 92
LA conversations
frame distributor assigns
g all frames from a conversation to one link
a conversation is defined as frames with same:
SA
DA
reception port
protocol (Ethertype)
higher layer protocol (LC info)
hash on above maps to port
before
be
o e moving
o g co
conversation
e sat o to a d
different
e e t link,,
ensure that all transmitted frames have been received (marker protocol)
LACP continuously monitors to detect if changes needed
AdvEth
Slide 93
Ethernet protection
Linear protection
Ring protection
Y(J)S APS
Slide 94
APS
Automatic Protection Switching (APS)
is a functionality of carrier-grade transport networks
is often called resilience
since it enables service to quickly recover from failures
is required to ensure high reliability and availability
APS includes :
Y(J)S APS
Slide 95
Y(J)S APS
Slide 96
G.8031
G.
8031
Q9 of SG15 in the ITU-T is responsible for protection switching
In 2006 it produced G.8031 Linear Ethernet Protection Switching
G.8031 uses standard Ethernet formats, but is incompatible with STP
The standard addresses
point-to-point VLAN connections
SNC (local) protection class
1+1 and 1:1 protection types
unidirectional and bidirectional switching for 1+1
bidirectional switching for 1:1
revertive and nonrevertive modes
1-phase signaling protocol
G.8031 uses Y.1731 OAM CCM messages in order to detect failures
G.8031 defines a new OAM opcode (39) for APS signaling messages
Switching times should be under 50 ms (only holdoff timers when groups)
Y(J)S APS
Slide 97
G.8031
G.
8031 signaling
The APS signaling message looks like this :
MEL
(3b)
VER=0
(5b)
(4b)
OPCODE=39
FLAGS=0
OFFSET=4
(1B)
(1B)
(1B)
requested sig
bridged sig
reserved
(1B)
(1B)
(1B)
END 0
END=0
(1B)
where
req/state identifies the message (NR, SF, WTR, SD, forced switch, etc)
prot. type identifies the protection type (1+1, 1:1, uni/bidirectional, etc.)
Slide 98
G.8031
G.
8031 1:
1:1 revertive operation
In the normal (NR) state :
Wh the
When
h failure
f il
iis cleared
l
d
tail-end leaves SF state and enters WTR state (typically 5 minutes, 5..12 min)
tail-end sends WTR message to head-end (in nonrevertive - DNR message)
t il d sends
tail-end
d WTR every 5 seconds
d
when WTR expires both sides enter NR state
Y(J)S APS
Slide 99
Ethernet rings ?
Ethernet has become carrier grade :
OAM
synchronization
y
The only thing missing to completely replace SDH is ring protection
However, Ethernet and ring architectures dont
don t go together
open loop
cut the ring
g by
y blocking
g some link
when protection is required - block the failed link
closed loop
disable
di bl STP (but
(b t avoid
id iinfinite
fi it lloops iin some way !)
when protection is required - steer and/or wrap traffic
Y(J)S APS
Slide 100
G.8032 (ERPS)
RFER (RAD)
ERP (NSN)
REP (Cisco)
RRSTP (Alcatel)
RRPP (Huawei)
EAPS (E
(Extreme,
t
RFC 3619)
PSR (Overture)
Closed loop methods
Slide 101
G.8032
G.
8032
Q9 of SG15 produced G.8032 between 2006 and 2008
G.8032 is similar to G.8031
employs
l
Y
Y.1731
1731 extension
t
i ffor R-APS
R APS signaling
i
li ((opcode=40)
d 40)
Slide 102
RPL
G.8032 defines the Ring
g Protection Link ((RPL))
as the link to be blocked (to avoid closing the loop) in NR state
One of the 2 nodes connected to the RPL
is designated the RPL owner
Unlike RADs RFER
th
there
is
i only
l one RPL owner
in revertive operation
once the failure is cleared the block link is unblocked
and
d th
the RPL iis bl
blocked
k d again
i
Y(J)S APS
Slide 103
G.8032
G.
8032 revertive operation
In the idle state :
adjacent
j
nodes exchange
g CCM at 300 p
per second rate ((includingg over RPL))
exchange NR RB (RPL Blocked) messages in dedicated VLAN every 5 seconds
(but not over RPL)
node(s)
d ( )d
detect
t t CCM and
d start
t t guard
d titimer (blocks
(bl k acting
ti on R
R-APS
APS messages))
node(s) send NR messages to neighbors (3 times @ max rate, then every 5 sec)
RPL owner receiving NR starts WTR timer
when WTR expires RPL owner blocks RPL
RPL, flushes table
table, and sends NR RB
node receiving NR RB flushes table, unblocks any blocked ports, sends NR RB
Y(J)S APS
104
Slide
G.8032
G.
8032--2010
After coming out with G.8032 in 2008 (G.8032v1)
the ITU came out with G.8032-2010 ((G.8032v2)) in 2010
This new version is not backwards-compatible with v1
but a v2 node must support v1 as well (but then operation is according to v1)
Major differences :
subring
ring
subring
Y(J)S APS
Slide 105
EFM
Ethernet in the First Mile (ex-802.3ah)
EFM bonding
AdvEth
Slide 106
AdvEth
Slide 107
AdvEth
Slide 108
EFM
LLC (802.2)
OAM (57)
MP MAC (64)
MAC
reconciliation
MII
Optics
100M (now in clause 58)
1G
(now
(
in
i clauses
l
59 60)
59,
EPON (now in clause 65 see GPON/GEPON course)
PCS (61)
TC ((G.993.1))
PMA (62/63)
PMD
P2MP clause 64
(58/59/60/62/63)
AdvEth
Slide 109
AdvEth
Slide 110
Ethernet frame
IPG
h d
header
f
fragment
t1
CRC header
h d
f
fragment
t5
PME 2
header
fragment
g
2
CRC header
fragment
g
6
PME 3
header
fragment 3
CRC header
fragment 7
PME n
header
fragment 4
CRC header
fragment 8
Fragmentation header :
sequence number
(14b)
SOP EOP
(1b) (1b)
AdvEth
Slide 111
RPR 802
802..17
AdvEth
Slide 112
RPR 802
802..17
Resilient Packet Rings
are compatible with standard Ethernet
are robust (lossless, <50ms protection, OAM)
are fair (based on client throttling)
supportt QoS
Q S (3 classes
l
A,
A B
B, C)
are efficient (full spatial reuse)
are plug and play (automatic station autodiscovery)
extend use of existing fiber rings
counter-rotating
g add/drop
p ringlets,
g
, running
g
ringlet0
ringlet1
developed by 802.17 WG
based on Ciscos Spatial
p
Reuse Protocol ((RFC 2892))
AdvEth
Slide 113
Why rings?
conventional Ethernet topologies are
point to point
point-to-point
bus
star
protection
fairness
simple multicast support
RPR mechanisms
input shaping
ringlet selection
buffer insertion
transit buffer(s)
AdvEth
Slide 114
Basic queuing
traffic g
going
g around ring
g
PTQ
STQ
fairness
AdvEth
Slide 115
class
use
info rate
D/FDV
FE
A0
RT
reserved
low
No
A1
RT
allocated
allocated,
low
No
bounded
No
reclaimable
B-CIR
B
CIR near RT allocated,,
reclaimable
B-EIR
near RT
BE
Slide 116
Class use
A0 ring BW is reserved not reclaimed even if no traffic
in dual-transit queue mode:
class A frames from the ring are queued in PTQ
class B, C in STQ
priority for egress
frames in PTQ
local class A frames
local class B (when no frames in PTQ)
frames in STQ
local class C (when no PTQ, STQ, local A or B)
Notes:
class A have minimal delay
class B have higher priority than STQ transit frames, so bounded delay/FDV
classes B and C share STQ, so once in ring have similar delay
AdvEth
Slide 117
RPR - fairness
1M
2M
1M
4M
2M
8M
4M
16M
8M
Slide 118
RPR - protection
rings give inherent protection against single point of failure
RPR specifies 2 mechanisms
steering
s ee g
wrapping (optional)
(implementations may also do wrapping then steering)
steering info
wrap
AdvEth
Slide 119
slot used
BW
used
d
BW reused
AdvEth
Slide 120
RPR - multicast
for regular Ethernet multicast requires replicating frames
for RPR, broadcast/flooding/multicast
simply
i l requires
i
nott removing
i fframe ffrom ring
i
multicast can be unidirectional or bidirectional
when TTL=0 the frame is finally removed
AdvEth
Slide 121
data frame
ETH MAC frame + TTL, frame type and flag fields
control
t l fframe
attribute discovery, topology, protection, round-trip measure, OAM, etc.
fairness frame
sent upstream to indicate required fair rate
idle frame
sent to neighboring node to avoid PTQ overflow due to lack of sync
AdvEth
Slide 122
Ethernet OAM
OAM functions
link OAM (802.3ah)
service OAM (Y
(Y.1731,
1731 802.1ag)
802 1ag)
AdvEth
Slide 123
OAM
analog channels and 64 kbps digital channels
did not have mechanisms to check signal validity and quality
thus
major faults could go undetected for long periods of time
hard
h d to
t characterize
h
t i and
d llocalize
li ffaults
lt when
h reported
t d
minor defects might be unnoticed indefinitely
as PDH networks evolved,, more and more overhead was dedicated to
Operations, Administration and Maintenance (OAM) functions
including:
monitoring
it i ffor valid
lid signal
i
l
defect reporting
alarm indication/inhibition
when SONET/SDH was designed
overhead was reserved for OAM functions
t d service
today
i providers
id
require
i complete
l t OAM solutions
l ti
AdvEth
Slide 124
OAM (cont.)
OAM is a user-plane function
but may influence control and management plane operations
for example
OAM may trigger protection switching, but doesnt switch
OAM may detect
d t t provisioned
i i
d lilinks,
k b
butt d
doesnt
t provision
i i th
them
OAM is more complex and more critical for PSNs
since in addition to previous problems
loss of signal
bit errors
we have new defect types
packets may
y be lost
packets may be delayed
packets may incorrectly delivered
OAM requirements are different for CO and CL modes
AdvEth
Slide 125
ITU--T concept
ITU
p - Trail
since OAM is critical to proper network functioning
OAM must be added to the concept of a connection
a trail is defined as a connection along with integrity supervision
clients gain access to the trail at access points (AP)
the trail termination function is responsible for
generating / processing OAM
trail
AP
TCP
AP
TCP
AdvEth
Slide 126
AdvEth
Slide 127
smallest
ll t observable
b
bl di
discrepancy
between desired and actual characteristics
defect (d):
density of anomalies that interrupts some required function
fault cause (c): root cause behind multiple defects
failure (f):
persistent fault cause - ability to perform function is terminated
action (a):
action requested due to fault cause
performance
f
parameter ((p):
) calculatable value representing ability to function
f
for example:
p
AdvEth
Slide 128
Supervision Flowchart
performance
monitoring
it i
anomaly
y
pX
statistics
gathering
th i
nX
defect
correlation
defect filter
cX
persistence
monitoring
fX
dX
consequent
action
aX
Slide 129
LoopBacks
in-service (nonintrusive)
out-of service (intrusive)
linktrace
performance monitoring
frame loss
one-way delay
round-trip delay
delay variation
throughput
AdvEth
Slide 130
Two flavors
AdvEth
Slide 131
EFM OAM
EFM networks are mostly p2p links or p2mp PONs
thus a link layer OAM is sufficient for EFM applications
Since EFM link is between customer and Service Provider
EFM OAM entities are classified as active (SP) or passive (customer)
active entity can place passive one into LB mode
mode, but not the reverse
but link OAM may be used for any Ethernet link, not just EFM ones
EFM OAMPDUs are a slow protocol frames not forwarded by bridges
Ethertype = 88-09 and subtype 03
messages multicast to slow protocol specific group address
OAMPDUs must be sent once per second (heartbeat)
messages are TLV-based
DA
01-80-C200-00-02
SA
TYPE
8809
SUB
TYPE
FLAGS
CODE
(2B)
(1B)
DATA
CRC
03
AdvEth
Slide 132
AdvEth
Slide 133
Y.1731
Y.
1731 OAM
SPs want to monitor full networks, not just single links
Service layer OAM provides end-to-end integrity
of the Ethernet service over arbitraryy server layers
y
Ethernet is the hardest case for OAM
AdvEth
Slide 134
Y.1731
Y.
1731 messages
Y 1731 supports many OAM message types:
Y.1731
LoopBack
L
B k
unicast/multicast
i
t/ lti
t pings
i
with
ith optional
ti
l patterns
tt
Link Trace
identify path taken to detect failures and loops
AIS
periodicallyy sent when CC fails, useful when no STP
RDI
LoCK signal
inform peer entity about intentional diagnostic actions
Test signal
in service/out of service tests for loss rate,
in-service/out-of-service
rate etc.
etc
Automatic Protection Switching
Maintenance Communications Channel remote maintenance
EXPerimental
Vendor SPecific
AdvEth
Slide 135
Y.1731
Y.
1731 frame format
after DA, SA and Ethertype (8902)
Y.1731/802.1ag PDUs have the following header (may be VLAN tagged)
LEVEL
VER
OPCODE
FLAGS
TLV OFF
TLV-OFF
(3b)
(5b)
(1B)
(1B)
(1B)
AdvEth
Slide 136
MA = Maintenance Association)
unique MEG IDs specify to which MEG we send the OAM message
MEPs responsible for OAM messages not leaking out
but transparently transfer OAM messages of higher level
MIPs = MEG Intermediate Points
never originate OAM messages,
process some OAM messages
transparently transfer others
AdvEth
Slide 137
AdvEth
Slide 138
Ethernet security
Security functions
802.1X
MACsec (802.1AE)
MACkey (802.1af)
AdvEth
Slide 139
Security functions
Some threats that may need to be countered in Ethernet networks
denial of service (DoS) to all or some stations
theft of service
access to confidential information
modification of information
control of restricted resources
Some security functions that solve some of these problems
source authentication
th ti ti
confidentiality
data integrity
replay protection
non-repudiation
blocking
g DoS attacks
protection against traffic analysis
AdvEth
Slide 140
802..1X
802
802.1X is a p
port-based access control mechanism
it enables or blocks traffic from a port
It provides authentication for devices wishing to communicate
It is based on the Extensible Authentication Protocol (RFC3748)
It is used in 802.11i for WiFi (WPA2)
In 802.1X there are three entities :
tthe
e aut
authenticator
e t cato
the supplicant
the authentication server (usually a RADIUS server)
802.1X PDUs use EtherType 88-8E
and multicast address 01-80-C2-00-00-03
AdvEth
Slide 141
802..1X operation
802
Upon
p detection of a new supplicant
pp
the authenticators switch port is set to unauthorized
only 802.1X traffic is allowed
The authenticator sends EAP-Request identity to the supplicant
The supplicant responds with EAP-response
The authenticator forwards response to the authenticating (RADIUS) server
If the server accepts the request
the authenticator sets the port to the "authorized" mode
traffic from supplicant is allowed in
AdvEth
Slide 142
MACsec
802.1AE was approved in June 2006
based on well known AES-128
AES 128 encryption
but with a new mode - Galois Counter Mode
Main features
works
k over Connectionless
C
ti l
network
t
kb
by fforming
i secure
associations
integrated
g
into Ethernet frame format
key management and association establishment outside scope
802.1AE
802
1AE MACsec provides
origin authentication
confidentiality
connectionless
ti l
d
data
t iintegrity
t it
replay protection
limited blocking of DoS attacks
but may lower some QoS attributes (e.g. introduces bounded delay)
AdvEth
Slide 143
MACsec format
DA
DA
SA
Type
payload
SA
FCS
secure data
d t
ICV
FCS
optional
confidentiality
integrity
SecTAG contains
12 B Initialization Vector
AdvEth
Slide 144
AES/GCM advantages
Initialization Vector nonce can be any length (but should not repeat for given key)
adopted by IEEE 802.1ae for MACsec and RFCs 4106 and 4543 for IPsec
AdvEth
Slide 145
AdvEth
Slide 146
802..1af
802
MACsec peers need to share encryption keys
keys need to be regularly updated
MACkey (802
(802.1af)
1af) is a key distribution protocol
provides authenticated distribution of keys needed by MACsec
MACkey
C
defines
f
MAC
C Key Distribution Protocol Data Units MKDPDUs
Authentication based on Extensible Authentication Protocol ((RFC
C3
3748)
8)
uses a centrally administered Authentication Server
MACkey defines EAP encapsulation over LANs (EAPOL)
AdvEth
Slide 147
Slide 148
Synchronous Ethernet
synchronizing networks
packet time protocols
synchronous Ethernet physical layer
AdvEth
Slide 149
Synchronizing networks
SONET/SDH/PDH/TDM networks require highly accurate timing
in every such network there is a primary reference clock
all other clocks derive timing from the PRC
the clock signal is carried in the physical layer
we can say that such networks distribute data + timing
applications needing accurate timing get it free
free
Slide 150
AdvEth
Slide 151
AdvEth
Slide 152
ESMC
Synchronous
y
network devices need to identifyy their clock quality
q
y
This is traditionally done using Synchronization Status Messages
G 8264 defines an Ethernet Synchronization Messaging Channel
G.8264
ESMC frames are slow protocol frames
with
ith th
the ITU
ITUs OUI (0
(0x0019A7)
0019A7)
and a new slow protocol subtype 0x0A
The frames carry a 4-bit SSM code
This code can contain any of the usual SSM values (PRC, SSU, SEC, )
or one of 2 new values defined for SyncE interfaces
AdvEth
Slide 153